KEMBAR78
Cyber Security and data Security for all.pptx
Introduction
The internet has made the world smaller in many
ways but it has also opened us up to influences
that have never before been so varied and so
challenging.
With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are also increasing. As fast
as security grew, the hacking world grew faster.
The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
What is Cyber Security ?
Cybersecurity is primarily about people, processes, and technologies
working together to encompass the full range of threat reduction,
vulnerability reduction, deterrence, international engagement, incident
response, resiliency, and recovery policies and activities, including
computer network ops, information assurance, law enforcement, etc.
Cyber Security includes being protected by internet-connected systems,
including hardware, software and data from cyber attacks.
In a computing context, security comprises cyber security and physical
security both are used by enterprises to safe against unauthorized
access to data centre and other computerized systems.
It is the body of technologies, processes, and practices designed to
protect networks, devices, programs, and data from attack, theft,
damage, modification or unauthorized access. It may also be referred to
as information technology security.
Why is Cyber Security Important?
Our world today is ruled by technology and we can’t do
without it at all. From booking our flight tickets, to catching up
with an old friend, technology plays an important role in it.
However, the same technology may expose you when it’s
vulnerable and could lead to loss of essential data. Cyber
security, alongside physical commercial security has thus,
slowly and steadily, become one of the most important topics
in the business industry to be talked about.
Cyber security is necessary since it helps in securing data
from threats such as data theft or misuse, also safeguards
your system from viruses.
•
•
Cyber Security Objectives
• Protect the confidentiality of data.
• Preserve the integrity of data.
• Promote the availability of data for authorized
users.
The objective of Cybersecurity is to protect
information from being stolen, compromised or
attacked. Cybersecurity can be measured by at least
one of three goals-
These goals form the confidentiality, integrity,
availability (CIA) triad, the basis of all security
programs.
Cyber Security Objectives
Confidentiality
 the property that information is not
made available or disclosed to
unauthorized individuals, entities, or
processes
Confidentiality
 Confidentiality refers to protecting information
from being accessed by unauthorized parties.
In other words, only the people who are
authorized to do so can gain access to
sensitive data.
 A failure to maintain confidentiality means that
someone who shouldn't have access has
managed to get it, through intentional
behavior or by accident. Such a failure of
confidentiality, commonly known as a breach
Integrity
the property of safeguarding the accuracy
and completeness of assets
Integrity
 Integrity refers to ensuring the authenticity of
information—that information is not altered,
and that the source of the information is
genuine.
 Imagine that you have a website and you sell
products on that site. Now imagine that an
attacker can shop on your web site and
maliciously alter the prices of your products,
so that they can buy anything for whatever
price they choose. That would be a failure of
integrity, because your information—in this
case, the price of a product—has been altered
and you didn't authorize this alteration
Availability
 The property of being accessible and
usable upon demand by an authorized
entity
Availability
 Availability means that information is
accessible by authorized users.
 Information and other critical assets are
accessible to customers and the
business when needed. Note,
information is unavailable not only when
it is lost or destroyed, but also when
access to the information is denied or
delayed
Types of Cyber Attacks
• A cyber-attack is an exploitation of computer systems and networks.
It uses malicious code to alter computer code, logic or data and lead
to cybercrimes, such as information and identity theft.
• Cyber Attacks can be classified as:-
Web based Attacks
• Injection attacks
• DNS Spoofing
• Session Hijacking
• Email Attacks
• Brute Force
• Denial of Service
• Dictionary Attacks
• URL Interpretation
• File Inclusion Attacks
• Man in the Middle
Attacks
System or Malware
Based Attacks
• Virus
• Worm
• Trojan horse
• Backdoors
• Bots
Malware : Sources
•
Removable
media,
like
Pendrive,
CDs,
DVDs,
and
flash
drives,
may
be
used
to
send
viruses
to
your
system.
Removable media
•
Viruses
can
be
hidden
in
document
files
with
the
.exe
extension.
As
soon
as
you
open
them,
the
virus
activates.
Documents and
executable files
•
Download
files
only
from
trusted
websites.
If
you
download
from
untrusted
websites,
there
may
be
chances
that
those
files
will
contain
viruses
Internet downloads
•
Be
sure
that
your
service
provider
is
genuine.
If
the
network
is
unsecured,
then
it
can
be
accessed
by
anyone.
Network connections
•
Never
open
email
attachments
unless
the
sender
can
be
trusted.
These
files
may
contain
viruses
to
create
backdoors.
Email attachments
•
Never
click
on
ads
that
you
don’t
trust.
They
are
created
so
that
you
can
click
on
them,
and
hackers
will
receive
details
about
you.
Malicious
advertisements
Malware : Functions
Overwhelming system resources: Malware, especially worms, can spread
around and overwhelm a system or network. Some malware creates so many
folders that no memory is left and slows a computer down.
Creating a backdoor: Let’s look at an example: Microsoft sends updates
every Sunday on all Windows platforms. How do these updates reach to your
Windows OS? They create backdoors from where they can send updates.
Similarly, hackers create backdoors from where they can continuously send
viruses after getting into a system.
Disabling security functions: Some malware can disable antivirus software,
as well as security updates. This malware tends to last longer because there is
no security to stop it. They tend to keep the system vulnerable to other
malware.
Creating botnets: Hackers make botnets by purely coding. A botmaster
controls botnets, and they are usually used to crash websites. Botmaster tells
all botnets to flood the website by accessing the website at the same time.
Cyber Attackers
In computer and computer networks, an attacker is the individual or
organization who performs the malicious activities to destroy,
expose, alter, disable, steal or gain unauthorized access to or make
unauthorized use of an asset. There are four types of Cyber
Attackers:-
• Cyber Criminals - are individual or group of people who use tech to
commit cybercrime with the intention of stealing sensitive company
information or personal data and generating profits.
• Hacktivists - are individuals or groups of hackers who carry out
malicious activity to promote a political agenda, religious belief, or
social ideology.
• State Sponsored Attackers – They have particular objectives aligned
with either the political, commercial or military interests of their country
of origin.
• Insider Threats - The insider threat is a threat to an organization's
security or data that comes from within. These types of threats are
usually occurred from employees or former employees, but may also
arise from third parties, including contractors, temporary workers,
employees or customers.
Cyber Security Principles
Data Security Consideration
Data security uses various methods to make sure that the data is correct,
original, kept confidentially and is safe. It includes-
• Ensuring the integrity of data.
• Ensuring the privacy of the data.
• Prevent the loss or destruction of data.
Data Security Consideration
• Backups - refers to save additional copies of our data in separate
physical or cloud locations from data files in storage. It is essential for
us to keep secure, store, and backup our data on a regular basis.
• Archival Storage - is the process of retaining or keeping of data at a
secure place for long-term storage. The data might be stored in safe
locations so that it can be used whenever it is required.
• Disposal of Data - Data destruction or disposal of data is the method
of destroying data which is stored on tapes, hard disks and other
electronic media so that it is completely unreadable, unusable and
inaccessible for unauthorized purposes. It also ensures that the
organization retains records of data for as long as they are needed.
Firewalls - Firewall is a computer network security system
designed to prevent unauthorized access to or from a private
network. It can be implemented as hardware, software, or a
combination of both.
VPNs - A VPN stands for virtual private network. It is a
technology which creates a safe and an encrypted connection on
the Internet from a device to a network. This type of connection
helps to ensure our sensitive data is transmitted safely.
Intrusion Detection - An IDS is a security system which monitors
the computer systems and network traffic. It analyses that traffic
for possible hostile attacks originating from the outsider and also
for system misuse or attacks originating from the insider.
Access Control - Access control is a process of selecting
restrictive access to a system. It is a concept in security to
minimize the risk of unauthorized access to the business or
organization.
Security Technologies
Cyber Security Standards
To make cybersecurity measures explicit, the written norms are
required. These norms are known as cybersecurity standards: the
generic sets of prescriptions for an ideal execution of certain
measures. The standards may involve methods, guidelines,
reference frameworks, etc.
Security standards include:
• International Organization for Standardization (ISO) - These standards
provide a world-class specification for products, services and computers, to
ensure quality, safety and efficiency. They are instrumental in facilitating
international trade.
• The Information Technology Act (ITA-2000) - Aims is to provide the legal
infrastructure in India which deal with cybercrime and e-commerce.
• Copyright Act - Copyright is a legal term which describes the ownership of
control of the rights to the authors of "original works of authorship" that are fixed
Cyber Security Tools
Firewalls
Antivirus software
Public Key Infrastructure (PKI) Services
Managed Detection and Response (MDR) Services
Penetration Testing
Staff Training
Cyber Security Challenges
Ransomware Evolution
Blockchain Revolution
Internet of Things (IoT) Threats
AI Expansion
Serverless Apps Vulnerability
Crypto Currency Hijacking
• TURN OFF AND REMOVE UN-NEEDED SERVICES
• ALWAYS KEEP YOUR PATCH LEVELS UP-TO-DATE
• ENFORCE A PASSWORD POLICY. USE COMPLEX PASSWORDS
• CONFIGURE MAIL SERVER TO BLOCK OR REMOVE E-MAILS CONTAINING
ATTACHMENTS COMMONLY USED TO SPREAD VIRUSES
• TRAIN EMPLOYEES NOT TO OPEN ATTACHMENTS UNLESS THEY ARE EXPECTING
THEM
• ISOLATE INFECTED COMPUTERS QUICKLY TO PREVENT FURTHER COMPROMISING
YOUR ORGANISATION
• REGULARLY UPDATE AND USE ANTI-VIRUS SOFTWARE
BEST SECURITY PRACTICES FOR
USERS AND SYS ADMINISTRATORS
• OPENING UNSOLICITED E-MAIL ATTACHMENTS WITHOUT VERIFYING
THEIR SOURCE
• FAILING TO INSTALL SECURITY PATCHES – ESPECIALLY FOR OS,
MICROSOFT OFFICE AND INTERNET EXPLORER
• INSTALLING SCREEN SAVERS OR GAMES FROM UNKNOWN SOURCES
• NOT MAKING AND TESTING BACKUPS
• USING MODEM WHILE CONNECTED THROUGH LAN
FIVE WORST SECURITY MISTAKES END-USERS
MAKE
• FAILING TO MAINT AND TEST BACKUPS
• RUNNING UNNECESSARY SERVICES LIKE FTP, TELNET AND MAIL
• IMPLEMENTING FIREWALLS WITH RULES THAT DOESN’T STOP
MALICIOUS OR DANGEROUS TRAFFIC-INCOMING OR OUTGOING
• FAILING TO UPDATE ANTI-VIRUS SOFTWARE
• FAILING TO EDUCATE USERS ON WHAT TO LOOK FOR AND WHAT TO
DO WHEN THEY SEE POTENTIAL SECURITY PROBLEM
FIVE WORST SECURITY MISTAKES IT PEOPLE
MAKE
Conclusion
In an organization, to accomplish an effective
Cyber Security approach, the peoples,
processes, computers, networks and
technology of an organization either big or
small should be equally responsible. If all
components will complement each other then, it
is very much possible to stand against the
tough cyber threat and attacks.

Cyber Security and data Security for all.pptx

  • 1.
    Introduction The internet hasmade the world smaller in many ways but it has also opened us up to influences that have never before been so varied and so challenging. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are also increasing. As fast as security grew, the hacking world grew faster. The term cyber security is used to refer to the security offered through on-line services to protect your online information.
  • 2.
    What is CyberSecurity ? Cybersecurity is primarily about people, processes, and technologies working together to encompass the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network ops, information assurance, law enforcement, etc. Cyber Security includes being protected by internet-connected systems, including hardware, software and data from cyber attacks. In a computing context, security comprises cyber security and physical security both are used by enterprises to safe against unauthorized access to data centre and other computerized systems. It is the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, theft, damage, modification or unauthorized access. It may also be referred to as information technology security.
  • 3.
    Why is CyberSecurity Important? Our world today is ruled by technology and we can’t do without it at all. From booking our flight tickets, to catching up with an old friend, technology plays an important role in it. However, the same technology may expose you when it’s vulnerable and could lead to loss of essential data. Cyber security, alongside physical commercial security has thus, slowly and steadily, become one of the most important topics in the business industry to be talked about. Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses. • •
  • 4.
    Cyber Security Objectives •Protect the confidentiality of data. • Preserve the integrity of data. • Promote the availability of data for authorized users. The objective of Cybersecurity is to protect information from being stolen, compromised or attacked. Cybersecurity can be measured by at least one of three goals- These goals form the confidentiality, integrity, availability (CIA) triad, the basis of all security programs.
  • 5.
  • 6.
    Confidentiality  the propertythat information is not made available or disclosed to unauthorized individuals, entities, or processes
  • 7.
    Confidentiality  Confidentiality refersto protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data.  A failure to maintain confidentiality means that someone who shouldn't have access has managed to get it, through intentional behavior or by accident. Such a failure of confidentiality, commonly known as a breach
  • 8.
    Integrity the property ofsafeguarding the accuracy and completeness of assets
  • 9.
    Integrity  Integrity refersto ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine.  Imagine that you have a website and you sell products on that site. Now imagine that an attacker can shop on your web site and maliciously alter the prices of your products, so that they can buy anything for whatever price they choose. That would be a failure of integrity, because your information—in this case, the price of a product—has been altered and you didn't authorize this alteration
  • 10.
    Availability  The propertyof being accessible and usable upon demand by an authorized entity
  • 11.
    Availability  Availability meansthat information is accessible by authorized users.  Information and other critical assets are accessible to customers and the business when needed. Note, information is unavailable not only when it is lost or destroyed, but also when access to the information is denied or delayed
  • 12.
    Types of CyberAttacks • A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer code, logic or data and lead to cybercrimes, such as information and identity theft. • Cyber Attacks can be classified as:- Web based Attacks • Injection attacks • DNS Spoofing • Session Hijacking • Email Attacks • Brute Force • Denial of Service • Dictionary Attacks • URL Interpretation • File Inclusion Attacks • Man in the Middle Attacks System or Malware Based Attacks • Virus • Worm • Trojan horse • Backdoors • Bots
  • 13.
    Malware : Sources • Removable media, like Pendrive, CDs, DVDs, and flash drives, may be used to send viruses to your system. Removablemedia • Viruses can be hidden in document files with the .exe extension. As soon as you open them, the virus activates. Documents and executable files • Download files only from trusted websites. If you download from untrusted websites, there may be chances that those files will contain viruses Internet downloads • Be sure that your service provider is genuine. If the network is unsecured, then it can be accessed by anyone. Network connections • Never open email attachments unless the sender can be trusted. These files may contain viruses to create backdoors. Email attachments • Never click on ads that you don’t trust. They are created so that you can click on them, and hackers will receive details about you. Malicious advertisements
  • 14.
    Malware : Functions Overwhelmingsystem resources: Malware, especially worms, can spread around and overwhelm a system or network. Some malware creates so many folders that no memory is left and slows a computer down. Creating a backdoor: Let’s look at an example: Microsoft sends updates every Sunday on all Windows platforms. How do these updates reach to your Windows OS? They create backdoors from where they can send updates. Similarly, hackers create backdoors from where they can continuously send viruses after getting into a system. Disabling security functions: Some malware can disable antivirus software, as well as security updates. This malware tends to last longer because there is no security to stop it. They tend to keep the system vulnerable to other malware. Creating botnets: Hackers make botnets by purely coding. A botmaster controls botnets, and they are usually used to crash websites. Botmaster tells all botnets to flood the website by accessing the website at the same time.
  • 15.
    Cyber Attackers In computerand computer networks, an attacker is the individual or organization who performs the malicious activities to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. There are four types of Cyber Attackers:- • Cyber Criminals - are individual or group of people who use tech to commit cybercrime with the intention of stealing sensitive company information or personal data and generating profits. • Hacktivists - are individuals or groups of hackers who carry out malicious activity to promote a political agenda, religious belief, or social ideology. • State Sponsored Attackers – They have particular objectives aligned with either the political, commercial or military interests of their country of origin. • Insider Threats - The insider threat is a threat to an organization's security or data that comes from within. These types of threats are usually occurred from employees or former employees, but may also arise from third parties, including contractors, temporary workers, employees or customers.
  • 16.
  • 17.
    Data Security Consideration Datasecurity uses various methods to make sure that the data is correct, original, kept confidentially and is safe. It includes- • Ensuring the integrity of data. • Ensuring the privacy of the data. • Prevent the loss or destruction of data. Data Security Consideration • Backups - refers to save additional copies of our data in separate physical or cloud locations from data files in storage. It is essential for us to keep secure, store, and backup our data on a regular basis. • Archival Storage - is the process of retaining or keeping of data at a secure place for long-term storage. The data might be stored in safe locations so that it can be used whenever it is required. • Disposal of Data - Data destruction or disposal of data is the method of destroying data which is stored on tapes, hard disks and other electronic media so that it is completely unreadable, unusable and inaccessible for unauthorized purposes. It also ensures that the organization retains records of data for as long as they are needed.
  • 18.
    Firewalls - Firewallis a computer network security system designed to prevent unauthorized access to or from a private network. It can be implemented as hardware, software, or a combination of both. VPNs - A VPN stands for virtual private network. It is a technology which creates a safe and an encrypted connection on the Internet from a device to a network. This type of connection helps to ensure our sensitive data is transmitted safely. Intrusion Detection - An IDS is a security system which monitors the computer systems and network traffic. It analyses that traffic for possible hostile attacks originating from the outsider and also for system misuse or attacks originating from the insider. Access Control - Access control is a process of selecting restrictive access to a system. It is a concept in security to minimize the risk of unauthorized access to the business or organization. Security Technologies
  • 19.
    Cyber Security Standards Tomake cybersecurity measures explicit, the written norms are required. These norms are known as cybersecurity standards: the generic sets of prescriptions for an ideal execution of certain measures. The standards may involve methods, guidelines, reference frameworks, etc. Security standards include: • International Organization for Standardization (ISO) - These standards provide a world-class specification for products, services and computers, to ensure quality, safety and efficiency. They are instrumental in facilitating international trade. • The Information Technology Act (ITA-2000) - Aims is to provide the legal infrastructure in India which deal with cybercrime and e-commerce. • Copyright Act - Copyright is a legal term which describes the ownership of control of the rights to the authors of "original works of authorship" that are fixed
  • 20.
    Cyber Security Tools Firewalls Antivirussoftware Public Key Infrastructure (PKI) Services Managed Detection and Response (MDR) Services Penetration Testing Staff Training
  • 21.
    Cyber Security Challenges RansomwareEvolution Blockchain Revolution Internet of Things (IoT) Threats AI Expansion Serverless Apps Vulnerability Crypto Currency Hijacking
  • 22.
    • TURN OFFAND REMOVE UN-NEEDED SERVICES • ALWAYS KEEP YOUR PATCH LEVELS UP-TO-DATE • ENFORCE A PASSWORD POLICY. USE COMPLEX PASSWORDS • CONFIGURE MAIL SERVER TO BLOCK OR REMOVE E-MAILS CONTAINING ATTACHMENTS COMMONLY USED TO SPREAD VIRUSES • TRAIN EMPLOYEES NOT TO OPEN ATTACHMENTS UNLESS THEY ARE EXPECTING THEM • ISOLATE INFECTED COMPUTERS QUICKLY TO PREVENT FURTHER COMPROMISING YOUR ORGANISATION • REGULARLY UPDATE AND USE ANTI-VIRUS SOFTWARE BEST SECURITY PRACTICES FOR USERS AND SYS ADMINISTRATORS
  • 23.
    • OPENING UNSOLICITEDE-MAIL ATTACHMENTS WITHOUT VERIFYING THEIR SOURCE • FAILING TO INSTALL SECURITY PATCHES – ESPECIALLY FOR OS, MICROSOFT OFFICE AND INTERNET EXPLORER • INSTALLING SCREEN SAVERS OR GAMES FROM UNKNOWN SOURCES • NOT MAKING AND TESTING BACKUPS • USING MODEM WHILE CONNECTED THROUGH LAN FIVE WORST SECURITY MISTAKES END-USERS MAKE
  • 24.
    • FAILING TOMAINT AND TEST BACKUPS • RUNNING UNNECESSARY SERVICES LIKE FTP, TELNET AND MAIL • IMPLEMENTING FIREWALLS WITH RULES THAT DOESN’T STOP MALICIOUS OR DANGEROUS TRAFFIC-INCOMING OR OUTGOING • FAILING TO UPDATE ANTI-VIRUS SOFTWARE • FAILING TO EDUCATE USERS ON WHAT TO LOOK FOR AND WHAT TO DO WHEN THEY SEE POTENTIAL SECURITY PROBLEM FIVE WORST SECURITY MISTAKES IT PEOPLE MAKE
  • 25.
    Conclusion In an organization,to accomplish an effective Cyber Security approach, the peoples, processes, computers, networks and technology of an organization either big or small should be equally responsible. If all components will complement each other then, it is very much possible to stand against the tough cyber threat and attacks.